heartbleed patterns ?

mike tancsa mike at sentex.ca
Wed Apr 9 22:21:01 EDT 2014


On 4/9/2014 5:57 PM, Carter Bullard wrote:
>
> So, long lived connections, low source load values, after the
> TLS handshake, and large dst byte counts for the memory dumps,
> all in the clear.

Hi Carter,
	This seems to make sense.  I think the challenge is that this also 
describes established imap sessions-- it doesnt have to be https traffic 
no ?   Unfortunately, I only have argus records without any user content.

Thinking aloud, I wonder what the best way to compare imap and http logs 
to argus data.  Normal imap traffic for example would show up in the 
applications logs.  However, an attacker, would not, or would just show 
up as a connect.  Perhaps thats a start.  Look for all connect errors like

dovecot: imap-login: Disconnected (no auth attempts in 2 secs): user=<>, 
rip=64.x.x.x, lip=64.y.y.y, TLS handshaking: Disconnected

and see if there were any large flows for the connecting IP.

Hmmm, thats a lot of cross referencing :)

Unfortunately, apache does not seem to log such connections :(  I guess 
I would have to look a different way.  Find all the large connections in 
argus and look for corresponding httpd-log entries ?

	---Mike



More information about the argus mailing list